Educause Security Discussion mailing list archives

Re: DMCA Infringement Handling


From: Tracy Mitrano <tbm3 () CORNELL EDU>
Date: Fri, 23 Sep 2011 20:05:33 +0000

Lots of stuff here too, I hope it is useful:  http://www.cit.cornell.edu/policies/copyright/dmca/dmca.cfm

Tracy


On Sep 23, 2011, at 3:53 PM, Sweeny, Jonny wrote:

Bob,

Here are our procedures:

https://protect.iu.edu/cybersecurity/safeonline/filesharing/procedure

~Jonny Sweeny
IU


-----Original Message-----
From: The EDUCAUSE Security Constituent Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Bob 
Bayn
Sent: Thursday, September 15, 2011 16:30
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: [SECURITY] DMCA Infringement Handling

We are considering revising our DMCA infringement handling procedures, especially with regard to repeat infringers.

I wonder what everybody else is doing with these issues?

We match up the complaint with our IP>Etnernet assignment and network traffic logs.  I forward the complaint to the 
student and disable their ethernet card registration.  They are required to pay $50 and give an assurance that the 
infringing file(s) and filesharing software have been removed.  I then re-enable their ethernet card registration for 
access to our network.

Repeat infringers get the same procedure except that they also are referred to the VP for Student Services for some 
sort of an appointment.  I do not know what happens in that appointment.

Would you share with me, so I could tabulate it and present the options others use to our administration:

1) What is your charge or penalty for first and repeat infringement?
2) When do disciplinary staff intervene?  first time or repeats?
3) How long do you deny network access?
4) If a student has multiple devices, do you deny access to all devices or just the one implicated in the complaint?
5) Who was involved in the approval process for your procedures?
6) How much pushback to you get from users who receive infringement notices?
7) Do you have an appeals process that has ever given an infringing user any relief?
8) May I use your institution name along with your other responses in my report to the administration?

Finally, a slightly separate question:
9) Do you ever get complaints forwarded from an agent of the pornography industry?  (we have seen a few recently)

Thanks for any info you are willing to share.

Bob Bayn          (435)797-2396            IT Security Team
We will never send you email asking for your password
(never, never, never with this one exception: NEVER!)
Office of Information Technology, Utah State University
      http://tinyurl.com/bicyclists-share-kidneys-v2-0
       USU employees - join the Phirst Phish Contest
    http://it.usu.edu/security/htm/phirst-phish-contest


Current thread: